A new direction in social network analysis: Online social network analysis problems and applications

U Can, B Alatas - Physica A: Statistical Mechanics and its Applications, 2019 - Elsevier
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …

All your location are belong to us: Breaking mobile social networks for automated user location tracking

M Li, H Zhu, Z Gao, S Chen, L Yu, S Hu… - Proceedings of the 15th …, 2014 - dl.acm.org
Location-based social networks (LBSNs) feature friend discovery by location proximity that
has attracted hundreds of millions of users world-wide. While leading LBSN providers claim …

Proximity-based security techniques for mobile users in wireless networks

L Xiao, Q Yan, W Lou, G Chen… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In this paper, we propose a privacy-preserving proximity-based security system for location-
based services in wireless networks, without requiring any pre-shared secret, trusted …

Message in a sealed bottle: Privacy preserving friending in mobile social networks

L Zhang, XY Li, K Liu, T Jung… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Many proximity-based mobile social networks are developed to facilitate connections
between any two people, or to help a user to find people with a matched profile within a …

Location based handshake and private proximity test with location tags

Y Zheng, M Li, W Lou, YT Hou - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A location proximity test service allows mobile users to determine whether they are in close
proximity to each other, and has found numerous applications in mobile social networks …

Location privacy without mutual trust: The spatial Bloom filter

L Calderoni, P Palmieri, D Maio - Computer communications, 2015 - Elsevier
Location-aware applications are one of the biggest innovations brought by the smartphone
era, and are effectively changing our everyday lives. But we are only starting to grasp the …

Privacy-preserving location proof for securing large-scale database-driven cognitive radio networks

Y Li, L Zhou, H Zhu, L Sun - IEEE Internet of Things Journal, 2015 - ieeexplore.ieee.org
The latest Federal Communications Commission (FCC) ruling has enforced database-driven
cognitive radio networks (CRNs), in which all secondary users (SUs) can query a database …

Fractional covers and communication complexity

M Karchmer, E Kushilevitz, N Nisan - SIAM Journal on Discrete Mathematics, 1995 - SIAM
It is possible to view communication complexity as the minimum solution of an integer
programming problem. This integer programming problem is relaxed to a linear …

Effectively collecting data for the location-based authentication in Internet of Things

Y Kawamoto, H Nishiyama, N Kato… - IEEE Systems …, 2015 - ieeexplore.ieee.org
The concept of Internet of things (IoT) has attracted attention as a key technology for
realizing future industrial society. In the future society, numerous “things” with sensors are …

[HTML][HTML] User location privacy protection mechanism for location-based services

Y He, J Chen - Digital communications and networks, 2021 - Elsevier
With the rapid development of the Internet of Things (IoT), Location-Based Services (LBS)
are becoming more and more popular. However, for the users being served, how to protect …